Author
Abstract
Phishing is more and more becoming a standard online threat, mainly due to social networking, web technology, and mobile innovations. Phishing taxonomies have mainly targeted core phishing processes, not the newly developed attack tactics, target environments, or defenses against emerging phishing types. Phishing poses a serious problem in the field of computer science, and more so in e-commerce and e-banking, which are responsible for the count of online transactions with payments. Sophisticated phishing page evolution requires adaptive countermeasures. Relying on machine learning (ML) to provide dynamic defence against these cunning baits. ML schemes circumvent static blacklists and instead identify new as well as repeated phishing attempts at an early rate by a look at traits like URLs, content, and user behavior. However, an ongoing evolutionary element enters the picture with phishers continuously adjusting their modus operandi. The battle is to be a step ahead, and ML's adaptability has shown its true value in this endless battle of the digital world. Extra tree classification (ETC) was used in this study to detect such phishing websites. Optimization method was utilized in this study, using 2 optimizers, Chaos gaming optimization (CGO) and tasmanian devil optimization (TDO), in the original model to increase its performance. Compared to ETC and ETCG, the ETTD model functions very well, and it is the best model in this paper. 2 percent makes up the difference between the ETTD model and the ETCG model, while about 6 percent makes the difference between the ETTD model and the ETC model.
Suggested Citation
Zhixia Yao, 2025.
"Predictive modeling of phishing websites: a comprehensive analysis of novel traits using extra tree classification and optimized hybridization tactics,"
International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 16(10), pages 3308-3324, October.
Handle:
RePEc:spr:ijsaem:v:16:y:2025:i:10:d:10.1007_s13198-025-02856-8
DOI: 10.1007/s13198-025-02856-8
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:16:y:2025:i:10:d:10.1007_s13198-025-02856-8. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.